HSC TRIAL Flashcards

1
Q

What contains min wages and agreements in the ICT industry?

A

Award

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If an employee was not hired because she is pregaz did this violate anti discrimin legislation or equal employment legislation

A

Anti Discrimination Legislation cunt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the saftey Data Sheet

A

This provides information about hazardous chemicals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During a backup process what file types would have been changed

A

Thje files that were fuckin archived cuntt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When would the factory recovery partion be used

A

When reinstallin the fookin operating system cunt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the most basic form of a text file?

A

.RTF file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the two directions in css

A

ltr (LEFT TO RIGHT) rtl (RIGHT TO LEFT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is an uninterruptable power supply good?

A

It is good as it means workers can work during a power outage and can be filter from a power surge in order to protect equipment from the power surge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to insert an automatic table of contents?

A

Refrence > Insert Automatic table of contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a web authoring software package?

A

A web authoring software package allows webpages to be previewed in the browser. It allows the ongoing management and maintenance of the website. It allows the use of widgets such as contact forms and slideshows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are methods a business could use to upload files to an external server provider?

A

FTP (File Transfer Protocol). It is free and can transfer big files through text files which can make it hard to use, so using it requires a bit of fucking expertise cunt.

Web Authoring Software is easier to use and you can upload files such as a whole website at once to a server but it is a paid service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What to implement if a website is hard to naviage

A

Introduce a navigation bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What to do if the website is a slow motherfucker

A

The business could implement commercialised services or software such as host of the website, more potential server bandwidth. Old information on the website can also be archived such as photos and web pages as it doesn’t have to be interacted with anymore or updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should be used to determine if service on the PC has stopped

A

System configuration you dumb cunts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of creating a pivot table?

A

To arrange and summarise the data into a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

One example of a human cost of a workplace injury is loss of

A

morale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An application allows the use of ALT+CTRL+Y to insert an image. When the user executes this function, the image does not insert. What could have caused this problem?

A

Macros disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A DVD is inserted into a computer then the computer is restarted. The computer connects to the network and retrieves a task sequence to install an operating system image. Which installation method is described above?

A

Network installation using boot media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is an internal source of work health and safety (WHS) information in an ICT organisation?

Minutes of a compliance meeting

A hardware manufacturer’s manual

A WorkCover information document

An Australian Computer Society publication

A

Minutes of a compliance meeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following best describes full justification?

Realigning text to a new margin

Positioning text at a specified tab

Wrapping text around an inserted image

Aligning text to both the left and right margins

A

Aligning text to both the left and right margins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is usually applied before a table of contents can be automatically generated in a word-processed document?

Autotext

Tab leaders

Default styles

Format painter

A

Default styles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What form of risk control is applied when a hazard is isolated?

A

Minimisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is required to change the page orientation for a single page in the middle of a document?

Page Break

Section Break

Column Break

Orientation Break

A

Section Break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of a pivot table?

A

To summarise a large amount of data in tables irrespective of the original layouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the destructive software in destructive and malicious software protection in diagnostic testing

A

Viruses, Virus signatures, Trojans, Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the malicious software and techniques in destructive and malicious software protection for diagnostic testing

A

Malware, phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the negative impacts of destructive and malicious software protection

A

Organisation/workplace, individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the protection tools of destructive and malicious software protection

A

Scheduled scanning and for detection and deactivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Removal procedures for viruses

A

Deactivate, clean or remove, recover lost/ damaged data, prevent a recurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what are the strategies and techniques for preventative maintenance

A

physical inspection, back up procedures, scheduled maintenance, proper environment, acceptable usage policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the back up procedures

A

Full Backup, Partial backup which is incremental and differential backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the different scheduled maintenances

A

Virus scanning, updates, clean and repair, optimise hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

WHat is the proper environment for computers

A

Protection of power sources including surge protectors, ups and software shutdown as well as providing advice on environmental conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the client business context

A

Orginastion/workplace and organisation/workplace policy, procedures and guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the organisation/workplace context

A

Structure, business function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the client business context for organisation policy

A

Diagnostics, preventative maintenance, system security, troubleshooting, virus protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the different troubleshooting meanings of

A

Diagnostic testing, operating system, platform, system diagnostic program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the general features of diagnostic tools

A

hardware tools and software tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

system and roots causes of different types of problems

A

electrical problems, hardware problems, operator/user, peripherals, software, connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Strategies for troubleshooting

A

Identify the problem, perform backups, establish likely cause, run diagnostics tests, interpret results, follow-up action with either cause is not confirmed and restart or cause confirmed and resolve problem, resolve the problem by determining plan of action and then implementing solution and back up system or modify system configuration and verify system functionality and implement preventative measures, document findings and then check client satisfaction

44
Q

What are examples of operating systems

A

Windows, Mac OS, Linux, Unix

45
Q

What is a graphical user interface

A

This allows the user to communicate with the operating system commands using windows, icons, mouse and pointing

46
Q

What does BIOS stand for and do

A

BIOS stands for basic input/output system and it is a chip in a computer motherboard that the operating system uses to communicate with input/output devices

47
Q

What does a FAT stand for and what does it do

A

File allocation table holds the information of where a file is stored on the disk - also used by the operating system to save files on the disk

48
Q

What are the functions of an operating system

A

Booting the computer, peform basic tasks such as managing peripheral devices, provides a user interface including a GUI and command line such as cmd, Handles systems resources such as allocating cpu and ram to programs, provides file management such as allowing users to create, copy, move and delete files. These include File allocation table (FAT) and NFTS

49
Q

What is NFTS

A

NT File system is a process that the Windows NT operating system uses for storing, organizing, and finding files on a hard disk efficiently.

50
Q

What are the types of operating systems

A

Batch systems which complete tasks in batches such as a phone to send out emails in batches, real-time systems which complete events as they occur such as an airline company use plane radars, multi-tasking systems which execute multiple processes at the same time most computers do this.

51
Q

What is a CPU

A

Central processing unit- chip in the computer that receives, processes and executes data

52
Q

What is GUI

A

Graphical user interface

53
Q

What is NOS

A

Network operating system - a type of operating system that allows access to a computer by many users

54
Q

What is a driver

A

A piece of software which allows hardware components to communicate with the operating system – allowing it to function properly

55
Q

What is a command prompt?

A

A user interface in which the user types commands

56
Q

What is a dumb terminal

A

A terminal that does not do its own processing – all processing is done by a central computer

57
Q

What is RAM

A

Random access memory – memory that is stored temporarily on a computer chip

58
Q

What are logical drivers

A

Part of a physical disk drive that the operating system treats as a separate drive

59
Q

What is benchmarking

A

An objective test or measurement that can be used to compare 2 or more products

60
Q

What is bundled software

A

An objective test or measurement that can be used to compare 2 or more products

61
Q

What is virtual memory

A

Virtual memory involves using hard disk space to supplement Random Access Memory (RAM)

62
Q

What is file fragmentation?

A
  • File fragmentation occurs when files are not saved in a sequential manner, being saved wherever there is space available on the disk, resulting in files becoming scattered around the disk
  • A defragmentation tool is used to put the files back in order – allowing the file system to run efficiently
63
Q

What is an event viewer

A
  • The event viewer consists of logs of system events, keeping records of certain processes that are happening on a computer. They can be used to look for problems that have occurred such as breaches in system security.
64
Q

How to perform a disk fragmentation

A
  1. Double click “My computer”
  2. Right click the drive that you want to defragment
  3. Select Properties à Tools à Defragment now
65
Q

What is paging

A

The moving of data from the main memory (RAM) to the disk drive for use in virtual memory

66
Q

What is Applet

A

A program that is started from within another program
The icons within the control panel are called applets

67
Q

What is system logs

A

Text files created by the system as certain events happen on a computer

Examples: errors, visits on a web server, warnings of impending problems

68
Q

What is service packs

A

Groups of programs that are supplied by computer software vendors to fix problems with already released system versions

69
Q

What are the two types of training

A
  • One on one – Training only one individual, allows the program to be better tailored to their specific needs.

Most useful for teaching practical concepts

  • Small Group – Training multiple individuals, allows time efficiency and the communication of different ideas

Most useful for teaching theoretical concepts

70
Q

What is a training plan

A

A training plan is a step by step outline of how an instructor will train a learner to achieve learning objectives – It provides an overall structure of the training session and includes the steps a trainer will undertake

71
Q

What are the methods of collecting customer feedback

A
  • Customer Surveys: Asking questions in order to evaluate customer satisfaction with the new system
  • Staff Questionaries: Asking questions aimed towards different aspects of a system, different surveys being given to different work roles. Allowing the business to evaluate employee satisfaction and difficulties in system development
  • Group Evaluation Sessions: Conducting sessions with different work units, allowing them to talk about their experience with the new system and give feedback
  • Interviewing Staff Members: Based on the results of staff questionaries further feedback can be obtained by selecting certain staff members
  • Observation: Looking at the system in action
72
Q

What is the criteria to evaluate the effectiveness/usability of a system

A
  • Ease of use – how easy do users find it to perform specific tasks
  • User satisfaction
  • Sufficient user support – are users satisfied with the support that the organization offers
  • How satisfied users are with their experience with the operating system
  • Overall capability and compatibility of the system
73
Q

What should the keyboard height be

A

The forearms are parallel to the floor and wrists are not bent

74
Q

How to reduce rsi

A
  • Adopting an ergonomically sound working environment
  • Regular rest breaks
  • Wrist exercises
  • Job rotation
75
Q

What are the employment contracts

A

Full Time

  • Employees that operate under a full time employment contract
  • Work a set amount of hours each week and earn a salary (35-40 hours per week)
  • They receive employment benefitssuperannuation, sick leave, holiday leave

Part Time

  • Employees that operate under a part time employment contract
  • Work a set amount of hours each week, yet the hours are more flexible and typically less than full time workers
  • They receive half of the employment benefits that full time workers receive
  • Make sure to include the examples – superannuation, sick leave and holiday leave every time you discuss benefits or you will lose marks

Casual

  • Employees that operate under a casual employment contract
  • Do not work a set amount of hours and work is not guaranteed
  • They are not eligible for employment benefits
  • They are eligible for extra pay such as double time and time-and-a-half
  • Paid 20-25% more than full and part time

Contract

  • An external third party that performs a specific function/service for the business in exchange for currency
  • Payed for completing the project
  • Work for the duration of project completion
  • Contactors pay their own income tax
76
Q

What is the kernel

A

Manages the basic operations of the operating system and computers processor

77
Q

What are the 2 different types of partial backups

A
  • 2 different types of partial backups
    • Differential: Backs up files that have been changed since the last FULL BACKUP
      • Copies all files since the last full backup à Overwrites last differential backup each time à When recovering data only the last full backup and the one differential backup are needed
    • Incremental: Increments à Backs up all files that have been changed since ANY BACKUP was made. (even if that last backup was incremental
      • Fastest type of backup
      • Different storage media needed for each backup à When recovering data the last full backup and each incremental backup afterwards are needed
78
Q

What is a mail merge?

A

: A software function that describes the production of multiple documents from a single template and structured data source

79
Q

How to peform mail merge

A
  1. Navigate to the “mailings” tab
  2. Select “use existing list”
  3. Select the data source that you will be using in the mail merge
  4. Navigate to the “mailings” tab
  5. Select “Insert merge field”

Assign field names to specific points in the template

80
Q

How to create a macro

A
  1. Navigate to the “view” tab
  2. Select “Macro’s”
  3. Select “Record Macro”
  4. Enter a name for the macro and bind a certain command to execute said macro
  5. Record the desired action
  6. Select “Stop Recording”
81
Q

How to create a table

A
  1. Navigate to the insert tab
  2. Select “tables”
  3. Select “insert table”
  4. Select relevant rows and columns
82
Q

What are the computer society code of ethics

A

Australian Computer Society à professional IT organization in Australia

Members of the ACS must be aware of and comply with the Australian Computing Society code of ethics

6 points

  • Public Interest – Placing the interests of the public first à over businesses and personal interests (kind of like CSR)
  • Quality of Life – Strive to enhance the quality of life for internal and external stakeholders
  • Honesty – Present honesty in your representation of skills, knowledge, services and products
  • Competence – Work competently and diligently in the best interest of stakeholders
  • Professional Development – Enhance both your personal development and the development of your employees
  • Professionalism – Uphold and enhance the integrity of the ACS and the respect of its members
83
Q

What are the different types of medias

A
  • Text and numbers
  • Audio
  • Video
  • Images
  • Animation
84
Q

Vector vs bitmapped images

A

Vector

Bitmapped

  • Can be edited more efficiently
  • Smaller file size
  • Can be resized without losing quality
  • Made up of shapes – so better for things such as diagrams
  • Ease of access
  • Individual pixels can be edited
  • More control over the image
  • Made up of pixels – so better for artwork, pictures etc
  • Generally difficult to create concise images, as you cannot control individual elements (pixels)
  • Becomes pixelated when resized
85
Q

What is a lossless format

A

Lossless – A compression format in which you don’t lose quality because the quality is stored for later

86
Q

What is a lossy format

A
  • Lossy – A compression format in which you do loose quality – the quality is thrown away when you compress
87
Q

How long does copyright last for

A

the authors life + 50 years

88
Q

What is ergonomics

A
  • Ergonomics refers to the relationship between an worker and their work environment
  • Involves setting up the work environment to suit individuals i.e. adjusting desks, chairs, computer equipment to suit the employees needs
  • Also involves changing work practices in order to ensure the health and safety of a an employee
89
Q

Methods to prevent discomfort while working in the IT field

A
  • Regular rest breaks
  • Adopting an ergonomic workplace
  • Relaxation of eyes regularly
90
Q

Why is it important to have a regular maintenance procedure

A
  • Through undertaking a regular maintenance procedure an organization will be able to gain an array on benefits
  • Increased life cycle of IT equipment
  • Increased efficiency as that equipment will likely work at a faster rate – also reducing the risk of time being spent fixing certain equipment
  • Compliance with WHS procedures as maintenance will make sure that everything is up to standard
91
Q

What is a UPS

A

Uninterruptable power supply – a device designed to give short term power to devices in the event of a blackout

92
Q

What is scanning

A
  • Scanning involves reading the content of executable files, looking for a virus code
93
Q

What is a logic bomb virus

A

A virus that remains inactive until triggered by a certain event (i.e. a certain date) – does not attempt to effect other files or computers

94
Q

What is a trojan virus

A

A harmless looking program that contains destructive code

95
Q

What is a worm virus

A

A virus which creates copies of itself on other networks and devices – taking up system memory can result in computers crashing

96
Q

What is a hoaxe virus

A

False viruses.

97
Q

How to fix your problem cunt

A
  • Softwares built in help program
  • Internet (i.e. forums, articles)
  • User Manuals
  • Readme files
  • Physical technology magazines
  • Help Desk
  • If the built in online help on a program is not suitable a web search using a search engine may be necessary
  • When there is an error, make sure to first check perform basic diagnostics – i.e. if a monitor will not turn on check the cabling first. Then either call for a technician or use a help guide
98
Q

IT Roles in an organisation and what they do

A

Role

Description

Desktop Publisher

  • Produces specially designed and presented documents
  • Uses Desktop Publishing Software

Hardware Technician

  • Establishes the network - including
    • Network Cabling
    • Installing workstations
    • Setting up printers and other peripherals

Help Desk Operator

  • Accepts problem reports from users
  • Assists users with less complex problems or directs them to a competent individual

ICT Manager

  • Manages staff in the ICT department

ICT Trainer

  • Provides training to clients using various training programs
  • Designing, Delivering and Improving training programs and user documentation

Network Administrator

  • Implements the network
  • Sets up and manages user accounts
  • Installs software on the network
  • Backs up files
  • Maintains network security

Programmer

  • Designs, Writes, Tests and Documents computer programs

Project Manager

  • Manages a particular project
    • Team working on the project
    • Client Communication

Systems Analyst

  • Analyzes and Documents the flow of information in existing systems
  • Designs information flows for new systems

Software Developer

  • Designs, Executes, Assesses and Troubleshoots software applications.

Web Designer

  • Designs and Develops internet sites and the businesses website
99
Q

4 different IT support roles

A
  • Network support officer
  • Help desk officer
  • Software support officer
  • Web support officer
100
Q

Characteristics of an effective communicator

A
  • Active Listener: Engage in active listening techniques such as mirroring and paraphrasing to best understand, and respond to the client
  • Polite, Friendly and Approachable: Act in a polite, friendly and approachable manner as to maximize client satisfaction
  • Adaptable to change: Having the ability to quickly adapt to changes in the workplace
  • Calm under pressure
  • Patient/Tolerant of others with less skill than themselves
  • The willingness to help clients reach a satisfactory solution
  • Up to date with/aware of organizational policies and procedures
  • Has knowledge of relevant information technology used in the organization
  • Organization Skills
  • Effective team worker
101
Q

Communication strategies

A

Face to Face Greetings: Showing that you are interested in the other person through

  • Smiling
  • Making eye contact
  • Introducing yourself and using the clients name if possible
  • Finding out how you can help the client
  • TONE: Act and respond in a positive and friendly manner. Making sure that your tone of voice reflects your attitude
  • BODY LANGUAGE: Utilizing effective body language throughout communication
  • ACTIVE LISTENING: Using active listening techniques
  • QUESTIONS: Using open and closed questions when necessary
    • Open = Detailed, Broad responses more information
    • Closed = Specific responses concise information
  • TECHNICAL LANGUAGE: Using technical language that is suitable to the clients skill level
  • ASSERTIVE: Being clear and honest when speaking about your feelings and respecting the rights and views of others
102
Q

What is the term risk in relation to workplace health and safety

A

Risk is the likelihood a potential hazard will cause harm within a workplace

103
Q

What is the formatting drive stage of the disk preparation order

A

It is the first process of preparing a data storage device such as hard disk drive or solid-state drive for initial use by creating one or more new file systems on the drive

104
Q

What is a page break used for?

A

A page break is used for indicating the end of a page when printing

105
Q
A